<html><head></head><body><div>
<meta charset="utf-8">
<div id="compose-body-wrapper" dir="auto"><div dir="auto">Blocked,
thanks</div><div dir="auto"><br></div><div dir="auto"
id="tmjah_g_1299"><br></div></div><div class="replyHeader" dir="auto">Kin
via Dxspider-support wrote:</div><br><br><div><blockquote
cite="mid:00ac01db88e8$56da7830$048f6890$@cronux.net" type="cite"
style="margin:0 0 0 .8ex;border-left:1px #ccc
solid;padding-left:1ex"><div>Hi,</div><div><br></div><div>After looking at
yesterday's logs, it is again evident that all roads lead</div><div>to
Rome.</div><div>Without digging too deep, you can clearly see that stations
like
the</div><div>following:</div><div><br></div><div>SN100IARU</div><div>HF100IARU</div><div>SP100IARU</div><div>IR0RRAI</div><div>HF95PZK</div><div><br></div><div>have
the same behaviour: spoofing of the source node and
IP.</div><div><br></div><div>It is true that Dirk's algorithm is working
very well, but I think we should</div><div>start taking stronger measures.
If a certain SES station is involved by the</div><div>methodology we
already know, it should be blocked. It is possible that they</div><div>will
take measures to prevent it.</div><div><br></div><div>This is going 'in
crescendo'. It is becoming more and more necessary to go</div><div>to
password-protected nodes for users and nodes in spot/ann
transmissions,</div><div>excluding completely those that are not
trustworthy.</div><div><br></div><div>Kin
EA3CV</div><div><br></div><div><br></div><div><br></div><div>_______________________________________________</div><div>Dxspider-support
mailing
list</div><div>Dxspider-support@tobit.co.uk</div><div>https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support</div></blockquote></div>
</div></body></html>